-
1
-
-
26844484295
-
-
Proceedings of the 1st International Conference on Natural Computation (ICNC 05) August 2005 Changsha, China Lecture Notes in Computer Science
-
Lai L.-B., Chang R.-I., Kouh J.-S., Mining data by query-based error-propagation 3610 Proceedings of the 1st International Conference on Natural Computation (ICNC 05) August 2005 Changsha, China 1224 1233 Lecture Notes in Computer Science
-
Mining data by query-based error-propagation
, vol.3610
, pp. 1224-1233
-
-
Lai, L.-B.1
Chang, R.-I.2
Kouh, J.-S.3
-
2
-
-
59949086499
-
Intrusion detection by backpropagation neural networks with sample-query and attribute-query
-
Chang R.-I., Lai L.-B., Su W. D., Wang J. C., Kouh J.-S., Intrusion detection by backpropagation neural networks with sample-query and attribute-query International Journal of Computational Intelligence Research 2007 3 1 6 10
-
(2007)
International Journal of Computational Intelligence Research
, vol.3
, Issue.1
, pp. 6-10
-
-
Chang, R.-I.1
Lai, L.-B.2
Su, W.D.3
Wang, J.C.4
Kouh, J.-S.5
-
3
-
-
36948999941
-
-
School of Information and Computer Science, University of California, Irvine, Calif, USA, 2007, http://archive.ics.uci.edu/ml
-
Asuncion A., Newman D. J., UCI Machine Learning Repository. School of Information and Computer Science, University of California, Irvine, Calif, USA, 2007, http://archive.ics.uci.edu/ml
-
UCI Machine Learning Repository
-
-
Asuncion, A.1
Newman, D.J.2
-
4
-
-
59949095519
-
-
Proceedings of the 1st Conference on Workshop on Intrusion Detection and Network Monitoring (ID 99) 1999 Santa Clara, Calif, USA
-
Ghosh A. K., Schwartzbard A., Schatz M., Learning program behavior profiles for intrusion detection 1 Proceedings of the 1st Conference on Workshop on Intrusion Detection and Network Monitoring (ID 99) 1999 Santa Clara, Calif, USA 6
-
Learning program behavior profiles for intrusion detection
, vol.1
, pp. 6
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
5
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W., Stolfo S., A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security 2000 3 4 227 261
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
6
-
-
0029716418
-
-
Proceedings of IEEE Symposium on Security and Privacy (SECPRI 96) May 1996 Oakland, Calif, USA
-
Forrest S., Hofmeyr S. A., Somayaji A., Longstaff T. A., A sense of self for Unix processes Proceedings of IEEE Symposium on Security and Privacy (SECPRI 96) May 1996 Oakland, Calif, USA 120 128
-
A sense of self for Unix processes
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
7
-
-
59949088681
-
-
Proceedings of the 1st International Workshop on the Recent Advances in Intrusion Detection (RAID 98) September 1998 Louvain-la-Neuve, Belgium
-
Anderson R., Khattak A., The use of information retrieval techniques for intrusion detection Proceedings of the 1st International Workshop on the Recent Advances in Intrusion Detection (RAID 98) September 1998 Louvain-la-Neuve, Belgium
-
The use of information retrieval techniques for intrusion detection
-
-
Anderson, R.1
Khattak, A.2
-
8
-
-
0024984441
-
-
Proceedings of IEEE Computer Society Symposium on Security and Privacy (RISP 90) May 1990 Oakland, Calif, USA
-
Teng H. S., Chen K., Lu S. C., Adaptive real-time anomaly detection using inductively generated sequential patterns Proceedings of IEEE Computer Society Symposium on Security and Privacy (RISP 90) May 1990 Oakland, Calif, USA 278 284
-
Adaptive real-time anomaly detection using inductively generated sequential patterns
, pp. 278-284
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.3
-
9
-
-
0003451777
-
-
Menlo Park, Calif, USA Computer Science Laboratory, SRI International
-
Lunt T., Tamaru A., Gilham F., A real-time intrusion detection expert system (IDES) 1992 Menlo Park, Calif, USA Computer Science Laboratory, SRI International
-
(1992)
A real-time intrusion detection expert system (IDES)
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
-
11
-
-
0026154682
-
-
Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy (RISP 91) May 1991 Oakland, Calif, USA
-
Javitz H. S., Valdes A., The SRI IDES statistical anomaly detector Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy (RISP 91) May 1991 Oakland, Calif, USA 316 326
-
The SRI IDES statistical anomaly detector
, pp. 316-326
-
-
Javitz, H.S.1
Valdes, A.2
-
15
-
-
0000231655
-
-
Proceedings of the National Information Systems Security Conference (NISSC 98) October 1998 Arlington, Va, USA
-
Cannady J., Artificial neural networks for misuse detection Proceedings of the National Information Systems Security Conference (NISSC 98) October 1998 Arlington, Va, USA 443 456
-
Artificial neural networks for misuse detection
, pp. 443-456
-
-
Cannady, J.1
-
16
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
Zhang C., Jiang J., Kamel M., Intrusion detection using hierarchical neural networks Pattern Recognition Letters 2005 26 6 779 791
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.6
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
17
-
-
0141464248
-
-
Proceedings of IEEE Workshop on Information Assurance and Security June 2001 West Point, NY, USA
-
Zhang Z., Li J., Manikopoulos C. N., Jorgenson J., Ucles J., HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification Proceedings of IEEE Workshop on Information Assurance and Security June 2001 West Point, NY, USA 85 90
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.N.3
Jorgenson, J.4
Ucles, J.5
-
18
-
-
0027306196
-
Quantization noise analysis and error feedback implementation in frequency sampling FIR filters
-
Gold D., Ur H., Quantization noise analysis and error feedback implementation in frequency sampling FIR filters Signal Processing 1993 30 1 103 113
-
(1993)
Signal Processing
, vol.30
, Issue.1
, pp. 103-113
-
-
Gold, D.1
Ur, H.2
-
19
-
-
0021518106
-
Theory of the learnable
-
Valiant L. G., Theory of the learnable Communications of the ACM 1984 27 11 1134 1142
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
-
21
-
-
0025721732
-
Query-based learning applied to partially trained multilayer perceptrons
-
Hwang J.-N., Choi J. J., Oh S., Marks R. J. II, Query-based learning applied to partially trained multilayer perceptrons IEEE Transactions on Neural Networks 1991 2 1 131 136
-
(1991)
IEEE Transactions on Neural Networks
, vol.2
, Issue.1
, pp. 131-136
-
-
Hwang, J.-N.1
Choi, J.J.2
Oh, S.3
Ii, J.M.R.4
-
22
-
-
0742303650
-
Query-based learning for aerospace applications
-
Saad E. W., Choi J. J., Vian J. L., Wunsch D. C., Query-based learning for aerospace applications IEEE Transactions on Neural Networks 2003 14 6 1437 1448
-
(2003)
IEEE Transactions on Neural Networks
, vol.14
, Issue.6
, pp. 1437-1448
-
-
Saad, E.W.1
Choi, J.J.2
Vian, J.L.3
Wunsch, D.C.4
-
23
-
-
24944469052
-
-
Proceedings of the 2nd International Symposium on Neural Networks (ISNN 05) May-June 2005 Chongqing, China Lecture Notes in Computer Science
-
Chang R.-I., Disease diagnosis using query-based neural networks 3498 Proceedings of the 2nd International Symposium on Neural Networks (ISNN 05) May-June 2005 Chongqing, China 767 773 Lecture Notes in Computer Science
-
Disease diagnosis using query-based neural networks
, vol.3498
, pp. 767-773
-
-
Chang, R.-I.1
-
24
-
-
0031094206
-
Unsupervised query-based learning of neural networks using selective-attention and self-regulation
-
Chang R.-I., Hsiao P.-Y., Unsupervised query-based learning of neural networks using selective-attention and self-regulation IEEE Transactions on Neural Networks 1997 8 2 205 217
-
(1997)
IEEE Transactions on Neural Networks
, vol.8
, Issue.2
, pp. 205-217
-
-
Chang, R.-I.1
Hsiao, P.-Y.2
|